The F5 Handbook for Service Providers. 24 Use Cases to Secure, Optimize, and Monetize Your Network
|
|
|
- Osborn Dorsey
- 9 years ago
- Views:
Transcription
1 The F5 Handbook for Service Providers 24 Use Cases to Secure, Optimize, and Monetize Your Network
2 Table of Contents Security Solutions 4 S/Gi Firewall 4 Carrier-Grade NAT 6 Intelligent DNS Firewall 8 VoLTE and IMS Security 10 Data Center Firewall 12 Data Traffic Management Solutions 14 Dynamic Service Chaining/Intelligent Traffic Steering 14 Subscriber and Application Bandwidth Control 16 Fair Usage Policy 18 Tiered Service Plans 20 Analytics 22 OTT Monetization 24 Bandwidth on Demand 26 TCP Optimization 28 URL Filtering 30 Content Insertion 32 Signaling Solutions 34 Intelligent DNS for the Mobile Core 34 Intelligent DNS Infrastructure 36 Interworking SDC 38 LTE Roaming 40 SIP/IMS 42 Network Functions Virtualization 44 Virtual CPE 44 Virtual Gi LAN 46 Optimize, Secure, and Monetize Your Network Mobile consumers are growing accustomed to anytime/anywhere access from their mobile devices to resource-intensive content, such as streaming video and high-bandwidth applications. Mass-market consumption of smartphones and other connected mobile devices, along with advanced 4G LTE network deployments, have led to massive and sustained growth in data usage. As a result, operating costs are rising while average revenue per user (ARPU) has trended flat to negative. To remain profitable, service providers must find new ways to support increased demands on their networks with more efficient resource utilization, while maintaining the ability to support rapid rollout of new revenue-generating services. F5 offers solutions for fixed and mobile service providers to achieve maximum optimization, security, and monetization of their networks. The sections below feature use cases that illustrate how you can maintain top network performance and profitability. Virtual EPC 48 Virtual IMS Network 50 Conclusion 52 F5 Solutions for Service Providers
3 Subscribers SG/i Firewall Protection SECURITY SOLUTIONS S/Gi Firewall Infected Laptop GGSN/ PGW/ASNgw Generic Platform VIPRION Platform IGR A high-performance, full-proxy firewall protects your core infrastructure. Malicious Attackers As mobile network operators and other service providers migrate to all-ip based networks such as 4G LTE, network intrusions and attacks are far more likely to occur. Service providers must constantly defend against security threats to ensure the availability of their most precious resource the network. This increases costs and operational complexity, and has a negative effect on network performance and the subscriber experience. F5 BIG-IP Advanced Firewall Manager (AFM) defends the mobility infrastructure and mobile subscribers from attacks, regardless of their source. This capability includes mitigation of large-scale DDoS attacks such as network floods, port scans and sweeps, or connection floods. By detecting and stopping these types of attacks, BIG-IP AFM can prevent congestion and overloading of the control and bearer planes of the radio access network. BIG-IP AFM protection against DDoS attack vectors continues to increase with each version released. With many BIG-IP platforms, DDoS protection functions are accelerated using specialized hardware. BIG-IP AFM, as an ICSA Labs Certified firewall solution, offers the protection of a full-proxy firewall, meaning that it fully terminates and inspects incoming client connections for threats. You ll have the assurance of network availability and an improved subscriber experience. Protect the core infrastructure with a high-performance, highly scalable firewall Defend against DDoS attacks across all layers 4 5
4 PROJECT: GUIDE-SP-CCNF USE CASE DIAGRAM: Carrier-Grade NAT IPv4/IPv6 Devices GGSN/ PGW Logging/LI IPv4 SECURITY SOLUTIONS Carrier-Grade NAT IPv4 Devices IPv4 IPv6 RGW RGW Access Node (IPv4 only) Access Node (IPv6 only) BRAS/ BNG/CMTS (IPv4 only) BRAS/ BNG/CMTS (IPv6 only) PE IPv4 Applications/ Enterprises PE IPv6 Applications/ Enterprises IGR IPv6 Deterministic NAT NAT 44/4, NAT 64 DS Lite AFTR Ensure seamless connectivity and a smooth migration to IPv6 with BIG-IP CGNAT. The worldwide proliferation of wireless and -enabled devices has rapidly depleted IPv4 addresses, and by 2018, 40 percent of mobile data traffic will be IPv6 addressed. Service providers are being challenged to support and manage existing IPv4 devices and content in the network, while at the same time transitioning to support newer IPv6 devices and applications. And because IPv6 devices and content are not backward compatible with IPv4, any IPv6 migration strategy needs to support the coexistence of IPv4 and IPv6 during the transition. F5 BIG-IP Carrier-Grade NAT (CGNAT) offers a broad set of high-performance, highly scalable tools that enable service providers to successfully migrate to IPv6 while continuing to support and interoperate with IPv4 devices and content. In addition, BIG-IP CGNAT provides extensive, flexible, high-speed logging capabilities along with support for IPFIX, which compresses NAT logging, therefore reducing the amount of data per log entry and minimizing overall costs. Manage address depletion and IPv6 migration with flexible deployment options Optimize network performance with carrier-grade performance and scalability Reduce server quantities and management costs BIG-IP CGNAT offers tunneling solutions, including Dual-Stack Lite (DS Lite) capabilities that allow you to support legacy IPv4 endpoints in your IPv6 network. DS Lite capabilities consist of endpoint IPv4 packets being encapsulated in an IPv6 tunnel and sent to an external IPv4 destination through your network. In addition, IPv6 rapid deployment (6rd) another tunneling service enables networks on IPv4 to communicate with IPv6 addresses without upgrading hardware. BIG-IP CGNAT also provides network address translation (NAT) functionality, enabling you to continue delivering IPv4 connectivity and to handle high numbers of concurrent sessions as you manage IPv4 address depletion and plan for a seamless migration to IPv6. F5 NAT functionality includes NAT44, which allows you to primarily focus on extending the use of IPv4 addresses in your network, as well as NAT64, which enables IPv6 endpoints to seamlessly and transparently access IPv4 content and destinations. BIG-IP CGNAT also supports 464XLAT and DNS64, which uses DNS AAAA records so IPv6 hosts can see IPv4 destinations as IPv6 addresses. 6 7
5 PROJECT: GUIDE-SP-CCNF USE CASE DIAGRAM: Intelligent DNS Firewall LDNS Query and response PGW/ GGSN Gi Firewall/ DNS Firewall Malicious Attackers SECURITY SOLUTIONS Intelligent DNS Firewall Malicious Attackers BIG-IP DNS protects the network and mitigates DDoS attacks while providing hyper-scale DNS services. Service providers use DNS to enable subscriber access to critical services and web applications. If DNS is unavailable, services will fail to function properly, leading to network and service degradation or failures. Service providers need to optimize and secure the DNS infrastructure to better serve mobile users. However, such an infrastructure requires a tremendous amount of real-time management and stability, and scaling DNS rapidly becomes critical when dealing with millions of service names and IP addresses. As service providers scale their control planes, they also need to ensure the security of subscriber and billing data, as well as the capacity to withstand attacks such as DNS DDoS attacks, DNS amplification attacks, and DNS tunneling for circumventing service limits. Optimize DNS infrastructure and Secure your network and mitigate hyper-scale service delivery DNS attacks and circumvention Monetize with improved network Ensure service experience and performance and lower churn extend service availability F5 BIG-IP DNS makes it easy for service providers to optimize, secure, and monetize their DNS infrastructures. The solution provides carrier-grade, highperformance LDNS caching and resolving, and is a hyper-scale authoritative DNS solution that includes DNS firewall security services for mitigating DNS DDoS attacks. BIG-IP DNS delivers an intelligent and scalable DNS infrastructure for faster access and service response for mobile users. In addition, it can load balance local and recursive DNS services. Service providers use customizable monitors and GSLB services to allocate the best resources to DNS queries and respond with the best service experience. BIG-IP DNS also enables a DNS64 environment, creating a faulttolerant architecture optimizing network traffic and increasing QoE for users, thus protecting service providers brand. In addition, BIG-IP DNS shields the DNS infrastructure from malicious attacks via infected subscribers and from undesired DNS queries and responses that reduce DNS and service performance. This intelligent DNS firewall from F5 inspects and validates protocols while dropping invalid requests or refusing to accept unsolicited responses. BIG-IP DNS is an ICSA Labs Certified network firewall with DDoS threshold alerting that hyper-scales across many devices using IP Anycast for DDoS absorption. It mitigates threats by blocking access to malicious IP domains. Finally, BIG-IP DNS offers enhanced, detailed stats with high-speed DNS logging and reporting, along with advanced analytics and performance metrics to deliver business intelligence for service and capacity planning, service optimization, and service monetization, as well as security troubleshooting. 8 9
6 PROJECT: GUIDE-SP-CCNF USE CASE DIAGRAM: VoLTE and IMS Security HPLMN Home Pool IMS Control Rx Sh ISUP/SIP-i PCRF PCRF PCRF Cx vx-cscf vsbc vmmtel/vas S9 Gx SGi S1- S6a CS Network SECURITY SOLUTIONS VoLTE and IMS Security Vo LTE User Equipment ENUM IPX Service Provider Network VPLMN LTEUu enodeb SEG S1-U S1- S11 Gx S5 SGW PGW Visited Pool PCRF PCRF PCRF S9 Gx S6a Diameter S6a Sh Cx HSS Rx Sh Cx SGi Firewall ENUM ENUM ENUM IPX Network Management IMS Control vx-cscf vsbc vmmtel/vas ISUP/SIP-i Vo LTE LTEUu S11 Gx S6a Sh Cx SGi User Equipment enodeb SEG S1-U S5 HSS CS Network VoLTE is a crucial service for service providers consolidating voice traffic from circuit switch networks to all-ip LTE networks in order to reduce overall network operation costs. The rate of VoLTE adoption is rapidly increasing (including one North American T-1 operator with nearly 40 percent of its voice calls on VoLTE). As VoLTE matures, attacks against the signaling resources used to provide services to customers including real-time signaling protocols will also increase. As a result, VoLTE security focusing on protecting and controlling signaling protocols including Diameter and SIP, for example is becoming more critical. Additionally, with more and more devices coming to the market with support only for IPv6, the ability to manage and control potential signaling spikes caused by these IPv6 devices is equally important. When a SIP signaling storm occurs due to unintended actions, other node outages in the network, or malicious attacks, it is important to rate-limit SIP requests to the P-CSCF so that it is not overwhelmed. Plus, with the increase in the types and numbers of new devices also come massive and continued changes in traffic and usage characteristics. To handle all these changes, operators will require solutions capable of very high connection rates and increasing concurrency. Deliver fast and secure VoLTE Support high connection rates and service a high level of concurrency Provide the highest possible Protect the brand and maximize security protection subscriber QoE SGW Protect against signaling storms while delivering fast, secure VoLTE services using F5 SDC and Gi firewall solutions with SIP ALG. PGW SGi Firewall F5 helps service providers deliver fast and secure VoLTE services. The F5 Traffix Signaling Delivery Controller (SDC) and BIG-IP platform with SIP application layer gateway (ALG) capabilities help ensure VoLTE service continuity and protect against unauthorized access, unexpected traffic peaks, signaling storms, session spoofing, and privacy attacks. The F5 firewall solution with SIP ALG monitors SIP messages and only permits RTP streams when the SIP ALG validates the SIP control channel and thus can provide security for user traffic in the network. By combining firewall, traffic management, DDOS protection, and carrier-grade network address translation (CGNAT) functions on the S/Gi LAN with SDC signaling control directly in front of the P-CSCF, F5 solutions can secure and distribute traffic, regardless of whether that traffic is from IPv4 or IPv6 devices. By doing so, the F5 solutions combine security and availability functionalities to maintain network service during times of unexpected stress. Additionally, F5 solutions enable service delivery with the highest possible protection, connection rates, and concurrency levels in the industry more than a terabit of throughput and up to 1.2 billion concurrent connections
7 PROJECT: GUIDE-SP-CCNF USE CASE DIAGRAM: Data Center Firewall DNS Services and Security DNS Visited PLMN Signaling Traffic Control and Security SDC Policy and Subscriber IMS and Non-IMS VNF Third-Party Server F5 VIPRION V-PCRF HSS Diameter Signaling OCS PCRF AAA/HSS SBC CSCF S/Gi Network Device Security via the BIG-IP Edge Client Devices Policy Enforcement + Network Firewall + Address Translation + DNS Services and Security PEM AFM CGNAT DNS IGR Data Layer Security Access Securtiy Signaling Layer Security EPC VNF SECURITY SOLUTIONS Data Center Firewall Application Security End-to-End, Policy- Driven, Dynamic Security DoS Security Across All Layers RGW Access Node BRAS/BNG /CMTS Third-Party Server PE F5 VIPRION Data Center DNS Services + Web Application Firewall + Network Firewall + Traffic Manangement DNS ASM AFM LTM DNS BIG-IP DNS CGNAT BIG-IP Carrier-Grade NAT SDC PEM Signaling Delivery Controller BIG-IP Policy Enforcement Manager ASM LTM BIG-IP Application Security Manager BIG-IP Local Taffic Manager F5 VIPRION AFM BIG-IP Advanced Firewall Manager Service providers networks continue to grow to adopt 4G and 5G technologies, rapidly deploy new services based in the data center, and host applications such as video and content streaming. These changes F5 solutions deliver comprehensive network protection from the data center to DNS infrastructures. not only threaten quality of service for users and increase capital and operational expenses, but also strain the security architecture s ability to handle a rapidly changing threat landscape. As a result, service providers need to enable growth while ensuring reliable and scalable security. Rapidly deploy new, revenuegenerating services and applications based in the data center Increase connection rates and concurrency Reduce space, power consumption, and TCO Improve quality of service for users F5 delivers a full range of solutions that simplify service providers security architectures while mitigating threats. The full proxy architecture of F5 solutions also allows service providers to attain extensive visibility and control throughout layers 4 through 7. This enables granular control of all connections, more extensive security functionality, and comprehensive end-to-end protection against DDoS and other attacks. F5 solutions protect targeted network elements, the DNS infrastructure, devices, and applications with features that include application health monitoring, a robust web application firewall, web access controls, TCP optimization, web acceleration, L7 DDoS protection, and broad SSL support including SSL inspection and offload. A leading T-1 service provider that implemented F5 data center firewall solutions reduced its hardware footprint by a factor of 20 a big improvement for scalability. Typical data center footprints can be reduced even more dramatically with F5 solutions for securing DNS. Ultimately, these solutions help simplify operations and lower total cost of ownership while securing the network and protecting the service provider s business and brand
8 7 Subscribers GGSN/ PGW Generic Platform VIPRION Platform DATA TRAFFIC MANAGEMENT SOLUTIONS Dynamic Service Chaining/ Intelligent Traffic Steering URL Filtering Transparent Caching Parental Controls VAS Platforms Video Optimization BIG-IP PEM with dynamic service chaining enables you to send traffic to multiple VAS platforms within a single call flow. To support the growing number of services offered to subscribers, service providers have deployed multiple value-added service (VAS) platforms from a variety of different vendors. However, these platforms cause more network complexity, increased deployment and operating costs, and challenges in deploying new services. All data traffic is routed to these platforms via existing layer 3 and layer 4 equipment (including policy-based routers), regardless of relevance. As a result, all VAS platforms must inspect the traffic, determine whether to apply traffic policies, or take specific action. This leads to additional VAS platforms needed to process all traffic, rather than just relevant traffic. F5 BIG-IP Policy Enforcement Manager (PEM) provides subscriber- and contextaware traffic management with the ability to perform layer 7 advanced steering to multiple VAS platforms (including web caching, video optimization, and parental control) based on parameters such as subscriber profile, device, content type, location, and network conditions. For example, BIG-IP PEM detects if a subscriber s mobile device is consuming video. If so, it can direct traffic from that device to your video optimization server. By steering traffic only to relevant servers, you can reduce the burden on other servers, thereby reducing CapEx and OpEx. Intelligent traffic steering can decrease the traffic to your VAS platforms by 50 to 75 percent, significantly saving CapEx and OpEx on VAS platforms and lowering total cost of ownership (TCO). Reduce deployment and operation costs Simplify network architecture Reduce time to deploy new services Increase ARPU with innovative services Create differentiated services Improve quality of experience (QoE) To add more value for subscribers, you can leverage the dynamic service-chaining capabilities of BIG-IP PEM to link multiple services together. Dynamic service chaining enables you to send traffic to multiple value-added services within a single flow. For instance, BIG-IP PEM can send subscribers who want to watch a specific video clip to a URL filtering/parental control service before sending it to a video optimization server, ensuring that these subscribers are allowed to view the content. With dynamic service chaining, you can create differentiated services and provide opportunities to increase ARPU
9 Global Global Application Control Control Global Global Application Control Control Overall Overall P2P= P2P= P2P=6 P2P=6 Mbps Mbps 10 Mbps 10 Mbps Overall Overall P2P= P2P= P2P=6 P2P=6 Mbps Mbps 10 Mbps 10 Mbps Subscriber Subscriber A P2P A (6 P2P Mbps) (6 Mbps) Subscriber Subscriber A P2P A (6 P2P Mbps) (6 Mbps) Subscriber Subscriber B P2P B (6 P2P Mbps) (6 Mbps) Subscriber Subscriber B P2P B (3 P2P Mbps) (3 Mbps) Subscriber Subscriber A P2P A (6 P2P Mbps) (6 Mbps) Subscriber Subscriber A P2P A (6 P2P Mbps) (6 Mbps) Subscriber Subscriber B P2P B (6 P2P Mbps) (6 Mbps) Subscriber Subscriber B P2P B (6 P2P Mbps) (6 Mbps) Subscriber Subscriber C P2P C (1 P2P Mbps) (1 Mbps) Subscriber Subscriber B P2P B (3 P2P Mbps) (3 Mbps) Subscribers Subscribers Subscriber Subscriber B P2P B (6 P2P Mbps) (6 Mbps) Subscriber Subscriber C P2P C (1 P2P Mbps) (1 Mbps) Subscribers Subscribers Even if Even subscribers if subscribers are entitled are entitled to more to more bandwidth bandwidth by subscriber by subscriber policy, it policy, is limited it is limited based on based global on policy. global policy. Even Subscriber if Even subscribers Subscriber A+B+C if subscribers are A+B+C P2P entitled are = P2P 10 entitled to Mbps more = 10 to Mbps more bandwidth bandwidth by subscriber by subscriber policy, it policy, is limited it is limited based on based global on policy. global policy. Subscriber Subscriber A+B+C A+B+C P2P = P2P 10 Mbps = 10 Mbps DATA TRAFFIC MANAGEMENT SOLUTIONS Subscriber and Application Bandwidth Control During peak times, heavily congested broadband networks can cause subscribers to have difficulty streaming both high-bandwidth video and low-bandwidth web applications. This causes significant deterioration in subscriber QoE. As a service provider, your challenge is to deliver a high quality of service (QoS) to your subscribers at all times, even during periods of heavy network congestion. Optimize network performance Increase ARPU with new services Gain additional brand and subscriber loyalty and reduce churn Per-Subscriber Application Control Control Per-Subscriber Application Gold Subscriber Gold Subscriber Control = 20 Mbps Control = 20 Mbps Subscriber Subscriber Subscriber Subscriber Gold Subscriber Gold Subscriber = 20 Mbps = 20 Mbps P2P = 4 P2P Mbps = 4 Mbps P2P = 512 P2P Kbps = 512 Kbps P2P traffic P2P is traffic reduced is reduced to configured to configured value even value even if subscriber if subscriber bandwidth bandwidth Other Applications Other Applications = = Other Applications Other Applications = = policy entitles policy entitles subscribers subscribers to more. to more. P2P 10 = Mbps 4 P2P Mbps 10 = Mbps 4 Mbps Other Applications Other Applications = = 10 Mbps10 Mbps P2P 10 = 512 Mbps P2P Kbps 10 = 512 Mbps Kbps Other Applications Other Applications = = 10 Mbps10 Mbps P2P traffic P2P is traffic reduced is reduced to configured to configured value even value even if subscriber if subscriber bandwidth bandwidth policy entitles policy entitles subscribers subscribers to more. to more. Bandwidth control limits can be applied at the application level or at a per-subscriber, per-application level. BIG-IP PEM delivers insight into subscriber behavior and effectively manages network traffic with a wide range of policy enforcement capabilities, while optimizing network performance by implementing bandwidth control policies at the subscriber and application level. As a subscriber-aware solution, BIG-IP PEM can identify subscriber usage and the type of plans they have implemented. Leveraging this information, BIG-IP PEM can provide subscriber bandwidth-controlling mechanisms via rate limiting, DSCP marking, and layer 2 QoS marking. These limits can be applied to a group of subscribers or to all subscribers, or even at the application level. With these limits, you can establish tiered services to create and manage incremental revenuegenerating plans based on subscribers actual data usage patterns. You can also use bandwidth control to implement fair-usage policies that allow subscribers to consume a fair amount of bandwidth while you distribute it more proportionally across the subscriber base. Traffic classification is a key feature of BIG-IP PEM. This enables you to identify the types of applications, services, and protocols that are being used to help you create application-specific plans or rate limits. Control how much bandwidth is being allocated for specific applications, such as rate-limiting P2P applications, during peak network congestion levels. BIG-IP PEM classifies traffic into several categories of applications and protocols including P2P, VoIP, web, and streaming applications
10 Max-Rate 12 Mbps bandwidth is distributed equally between subscribers Subscriber A (6 Mbps) Subscriber A (4 Mbps) Subscriber B (5 Mbps) Subscriber B (4 Mbps) Subscriber C (4 Mbps) Subscriber C (4 Mbps) DATA TRAFFIC MANAGEMENT SOLUTIONS Fair Usage Policy Subscribers Ensure higher QoE by evenly distributing bandwidth between subscribers. Service providers need to provide consistent QoE to ensure that subscribers receive the service they have signed up for. However, many networks have a small percentage of subscribers classified as heavy data users who continuously download and stream large amounts of content. Not only does this significantly strain the network, but it also inhibits the ability for other users who occasionally stream or download content from getting the network speeds they have paid for. Leveraging BIG-IP PEM, you can detect heavy data users and the type of applications they are using. Subscriber and application awareness functionality helps you control rates on a per-subscriber and per-application basis, according to their existing rate plan. By evenly distributing bandwidth between subscribers and fairly allocating bandwidth, you ll ensure higher QoE while efficiently managing network resources. Decrease network congestion Provide high QoE to subscribers Reduce churn 18 19
11 Bronze Subscriber (5 Mbps) Silver Subscriber (10 Mbps) Gold Subscriber (20 Mbps) Subscribers Generic Platform VIPRION Platform DATA TRAFFIC MANAGEMENT SOLUTIONS Tiered Service Plans Offer rate plans based on subscriber preferences and their bandwidth requirements. Service providers want new services that will help drive revenue while providing a high QoE to their subscribers. These service providers cater to diverse subscriber bases with different expectations in the amount of bandwidth they require and how much they are willing to pay. Tiered service plans let you offer specific rate plans based on subscriber preferences and their requirements for bandwidth and broadband speed. A certain market demographic may require the highest speeds possible while others only need content with best effort. The ability to offer tiered service plans with quota management ensures a high QoE for your subscriber base and increased revenues from those who utilize the network the most. For example, you can implement a bronze, silver, or gold plan. Bronze and silver subscribers would be capped at a certain data limit and best-effort data speeds, whereas gold subscribers would get unlimited data and guaranteed class of service. Service plans can also be application specific or based on time of day. Gain more revenue from highusage subscribers Achieve greater optimization of the network Increase brand loyalty 20 21
12 DATA TRAFFIC MANAGEMENT SOLUTIONS Subscribers GGSN/ PGW Generic Platform VIPRION Platform Analytics Analytics gives you new ways to provide innovative services for your subscribers. New services allow service providers to cater more closely to subscriber needs and preferences. Until recently, however, service providers couldn t get detailed information on their subscribers network usage or preferred applications. This lack of data meant that they could only offer subscribers a one-size-fits-all model of generic services and rate plans. But increased competition required service providers to rethink their approach. Solutions with application visibility now give them an opportunity to offer more innovative services. BIG-IP PEM classifies traffic based on application type, giving you new ways to provide tailored services for your subscribers, generate new revenues, and increase customer satisfaction. With application charging and quota management, you can offer customized service plans based on subscriber requirements. For example, subscribers may be interested in a VoIP package. For an additional cost, you can offer a plan that will give those subscribers unlimited VoIP usage. If subscribers want a business package, you can offer the service-enabling business applications to be used without affecting those subscribers data caps. Analytics lets you offer multiple types of services based on specific market demographics resulting in increased revenues, improved user experience, and greater brand loyalty. Introduce innovative new services Increase ARPU/brand loyalty 22 23
13 Unlimited Music streaming and/or messaging Spotify Deezer Subscriber All other traffic Capped Volume DATA TRAFFIC MANAGEMENT SOLUTIONS OTT Monetization Netflix Hulu DropBox Skype Develop joint partnerships with OTT providers to offer services to your subscribers. Over-the-top (OTT) providers put pressure on service providers by offering bandwidth-intensive applications that drive networks to full capacity, while providing minimal or no revenue to the service providers. As a service provider, you can become more proactive and develop joint partnerships with these OTT providers rather than let them take all the revenues. With BIG-IP PEM, you can detect and classify specific applications and implement unique policies, such as applying a higher QoS to specific applications or excluding applications from a subscriber s data cap. For example, you can identify a videostreaming application and determine that a subscriber has paid for the premium package. The subscriber then receives guaranteed QoS at all times for that application, while other applications are delivered based on best effort. You can also identify specific OTT applications and exclude those from a subscriber s data usage. For instance, subscribers using Facebook would be zero-rated, whereas other applications would count against their data cap. In both scenarios, you can form business partnerships with OTT providers and be paid for these services. Achieve higher QoE for subscribers Increase revenues 24 25
14 Subscriber can temporarily increase the throughput of a session to speed up a large download 10 Gbps Turbocharged 30 Gbps 10 Gbps Subscriber DATA TRAFFIC MANAGEMENT SOLUTIONS Bandwidth on Demand User Portal User Portal Provide your subscribers with a boost in bandwidth based on the time of day. Increased demand for bandwidth requires service providers to expand their networks and add capacity to accommodate subscribers. However, peak traffic only happens at certain times of the day, while other times, service providers may have ample capacity with network components sitting idle, resulting in potential lost revenue. You can further differentiate your offerings by adapting to subscribers real-time bandwidth requirements and quota management. A subscriber may only want a boost in bandwidth for a certain amount of time each day (either on- or off-peak hours). This gives you an opportunity to generate incremental revenue by charging a premium to the subscriber for that period. You can also monitor your network for low utilization during off-peak hours, letting subscribers opt in for an additional fee to get higher bandwidth speeds during these less-congested times. In both cases, once the time period is over, the subscriber will resume normal broadband speeds. You ll generate additional revenue while more efficiently utilizing network resources. Optimize network resources Provide higher subscriber QoE Increase revenue opportunities 26 27
15 Mobile Client RAN GGSN/ PGW Generic Platform VIPRION Platform Origin Server Cell-optimized TCP stack TCP Proxy Optimization WAN-optimized TCP stack DATA TRAFFIC MANAGEMENT SOLUTIONS TCP Optimization Optimize TCP connections independently on both the side and the wireless access network side. Within 3G/4G networks, mobile users are subject to the network connections based on the characteristics of the wireless access network typically high latency, packet loss, and congestion. On the side, the network has different performance characteristics including low latency, low packet loss, high bandwidth, and minimal congestion. To ensure the best customer experience, service providers must implement a solution to optimize the connection on both the side and the wireless access network. Leveraging the BIG-IP system, you can optimize the TCP connections independently on both the side and the wireless access network side. The result will be a significant performance boost for data transfer rates and up to a 200 percent bandwidth utilization improvement significantly increasing QoE for your subscribers. Provide higher QoE to subscribers Increase revenues with increased data usage 28 29
16 Policy and Subscriber Management OCS PCRF AAA/HSS Gx/Gy 1 2 PGW/ GGSN Generic Platform VIPRION Platform DATA TRAFFIC MANAGEMENT SOLUTIONS URL Filtering Trying to Access Blocked URL Integrated Webroot URL Filtering/Blacklist Access Denied 3 Blocked URL PEM BIG-IP Policy Enforcement Manager The increasing percentage of young children and teenagers using devices to access the can be a cause of concern for many parents, especially as it relates to the inappropriate content that is easily accessible and often unmonitored. Service providers need to come up with solutions that allow parents to control what sites their children can access. In addition, fixed and mobile service providers are required to comply with country regulations to block access to blacklisted content and provide a higher QoE for all of their subscribers. BIG-IP PEM checks URL requests and blocks access to blacklisted sites as defined by subscribers or service providers. Service providers have an option to integrate URL filtering services within BIG-IP PEM. With URL filtering, you can implement parental control services by blocking traffic to specific websites based on specific URL categories. Parental control services allow you to offer new revenue-generating services that provide greater QoE for subscribers. In many countries, the service provider is responsible for URL filtering and content blocking to ensure that subscribers do not have access to potentially harmful content and that they adhere to cultural regulations. With built-in blacklisting capabilities, the F5 solution enables you to block access to a set of defined URLs or specific categories, such as gambling or child pornography, and allows access to specific content as defined by whitelists. Increase revenues Maximize subscriber QoE 30 31
17 Centralized Policy Control Personalized Services (Ad Services) PCRF AAA OCS CSCF HHS RADIUS Diameter SIP Gx Policy Control + Subscriber Awarenesss + Application Visibility DATA TRAFFIC MANAGEMENT SOLUTIONS Content Insertion Subscribers GGSN/ PGW Generic Platform VIPRION Platform Personalize the subscriber experience and increase revenue with content insertion. Service providers are continuously looking for ways to monetize and increase brand loyalty from subscribers. The devices used by mobile subscribers can provide a wealth of information to service providers including subscriber location, applications used, and content viewed. Service providers can leverage this data to offer personalized services and insert content (such as ads and toolbars) within their devices that immediately benefit subscribers. Personalized services offer a better subscriber experience while improving top-line revenue. With the BIG-IP system, you ll gain subscriber and context awareness, and a deep understanding of subscribers mobile preferences. The BIG-IP system also allows you to insert targeted information into HTTP headers on mobile devices. For example, a subscriber using a mobile device to look for a coffee shop could receive a discount ad for the nearest location. This type of service personalizes the subscriber experience and also opens up additional business/revenue opportunities with the local retail stores paying you to insert ads into HTTP headers. Gain revenues Increase subscriber brand loyalty 32 33
18 Mobile Core Mobile Devices GGSN/ PGW DNS/GSLB DNS SIGNALING SOLUTIONS Intelligent DNS for the Mobile Core Clients Mobile Devices Access SGW/SGSN BIG-IP Platform Mobile Core BIG-IP DNS automatically monitors each GGSN and packet gateway using the GSLB engine, and intelligently replies to DNS queries for the subscriber s Access Point Name (APN) with the most available GGSN/ GGSN/PGW for optimal service delivery. PGW Today most operators use a set of Domain Name System (DNS) solutions in the mobile core or Evolved Packet Core (EPC) to provide a static list of packet gateways or GGSNs (GPRS support node) for finding critical services. DNS provides the directory service by connecting service names to addresses. When a service request is initiated, DNS provides a static list of packet gateways. However, these gateways are not monitored, which makes the list non-deterministic (not based on monitoring or capacity). Overloading of a packet gateway can cause poor performance and service due to dropped connections and unanswered requests. Access Clients SGW/SGSN DNS/GSLB DNS BIG-IP Platform By using F5 DNS and global server load balancing (GSLB) services for infrastructure deployments in the mobile core, the health and status of packet gateways or GGSNs can be monitored. When subscribers need high-speed access to billing, support, and services, you can realize additional value from BIG-IP DNS. With customizable monitors, you can use the GSLB function to allocate the best resources to DNS queries and respond with the best service experience. For example, the gateway selection process can be optimized by automatically monitoring the packet gateway devices and only providing answers to the DNS queries for gateways that are active and available. Increase availability of services Achieve closer mapping of capacity to required load Reduce overhead through overprovisioning Allow capacity to be added or removed automatically BIG-IP DNS adds real-time intelligence to the packet gateway and GGSN selection process, which is critical for service delivery. BIG-IP DNS distributes the load intelligently across available GGSN and packet gateways, ensuring an optimal subscriber experience at all times
19 Control Plane Subscriber Management Billing/Self-Service IP Multimedia Subsystems (IMS) DNS/ ENUM HSS/HLR DHCP Activation CSCF Customer Portal MGCF SBC DNS Authoritative Local Zones PCRF SIGNALING SOLUTIONS Intelligent DNS Infrastructure Data Plane Mobile enodeb SGW/SGSN Mobile Core DNS/ GLSB GGSN/PGW DNS Auth. Local Zones Web Caching Gi Infrastructure DNS Caching Resolvers Transparent Cache WAP Gateways Content Streaming DNS64 NAT64 Fixed Core F5 DNS services optimize, secure, and monetize the operator s network. DNS is a core technology and one of the most important components in a service provider s networking infrastructure, enabling Fixed BRAS users to access web applications and services. If DNS is unavailable, services will fail to function properly. Service providers need to build an optimized and secure DNS infrastructure to better serve their users. However, creating this infrastructure requires a tremendous amount of real-time management, stability, and room to grow. Scaling DNS rapidly becomes a critical issue when dealing with millions of service names and IP addresses. As service providers scale their control plane, they also need to ensure the security of subscriber and billing data, as well as the capacity to withstand attacks. These include DDoS attacks, DNS amplification attacks, and cache-poisoning attacks. BIG-IP DNS makes it easy for you to optimize, secure, and monetize your DNS infrastructures. It provides carrier-grade, high-performance LDNS caching and resolving, and is a hyperscale authoritative DNS solution that includes security service capabilities. BIG-IP DNS delivers an intelligent and scalable DNS infrastructure for faster access and web response to services for mobile users. In addition, it can load balance local and recursive DNS services. BIG-IP DNS also enables a DNS64 environment, creating a fault-tolerant architecture optimizing network traffic and increasing QoE. Optimize network performance Maximize subscriber QoE Increase intelligence, flexibility, and automation 36 37
20 Diameter S6a MAP Gr HSS Signaling Delivery Controller SGSN Diameter S6a MAP Gr Signaling Delivery Controller HLR SIGNALING SOLUTIONS Interworking SDC Diameter S13 Signaling Delivery Controller MAP Gf EIR The Diameter-MAP interworking function is enabled by the SDC to connect with legacy signaling. RADIUS MAP Gr An interworking function (IWF) acts as a gateway to enable 2G and 3G network elements to connect and communicate with 4G LTE network AAA Signaling Delivery Controller HLR elements for instance, between SS7 MAP-based or Diameter-based interfaces. This connection is essential: Without it, service providers would have to totally replace their legacy infrastructure and systems while building out their LTE networks. When introducing new IMS or LTE elements equipped with Diameter protocol connectivity into the core network, you must ensure that these elements integrate quickly and interface well with the other network elements, regardless of their legacy generation or vendor origin. An IWF ensures that old and new network elements can integrate and connect seamlessly with each other. The F5 Traffix Signaling Delivery Controller (SDC) offers interworking functionality through its Diameter gateway to ensure interoperability in a multi-vendor environment. The SDC provides RADIUS-Diameter gateway functionality, allowing RADIUSbased AAAs to communicate via Diameter and RADIUS-MAP interworking for HLR authentication of WiFi traffic. It also supports legacy protocols and mapping for legacy network connectivity, such as between SS7 and Diameter interfaces. In this way, you can transition easily from legacy to LTE infrastructure. The SDC Diameter gateway enables connectivity between old and new network elements and also supports interconnectivity in roaming. Protect existing infrastructure investments Generate new revenue streams 38 39
21 HSS HSS Roaming Partners IPX PCRF HSS OCS PCRF PCRF Roaming Hub DEA PCRF HSS OCS SIGNALING SOLUTIONS LTE Roaming PGW Diameter Normalization Interworking Function (IWF) Interconnect to Foreign Realms Intelligent Roaming (Steering of Roaming) Congestion Control Signaling Spike Protection Manage Error Behavior and Roaming Control Reductions in Number Connectivity Security DEA PCRF HSS OCS The SDC helps you seamlessly connect with roaming partners. As service providers deploy LTE networks, they need to provide roaming services to LTE subscribers, including connectivity between LTE and 2.5G/3G roamers. This complex process requires addressing routing, scalability, and security issues while maintaining high QoS. The Traffix SDC helps you fulfill technical requirements and generate revenue from roaming. To overcome the complexity resulting from connecting roamers using different technologies (e.g., 2G/3G versus 4G), the SDC works as an IWF, Diameter gateway, and Diameter Edge Agent (DEA) providing connectivity, routing, translation capabilities, and extensive security. When deploying the SDC, you can connect quickly and safely with all other mobile networks, wholesale roaming providers, and IP exchange (IPX) carriers. Achieve faster time to market with new roaming partners Introduce new services Grow your network and profits 40 41
22 PROJECT: GUIDE-SP-CCNF USE CASE DIAGRAM: SIP/IMS Pool PCRF PCRF PCRF Centralized routing of Diameter messages PCRF binding Routing of charging records Topology hiding Rx Sh Cx X-CSCF IMS Control SBC MMTEL/vAS ISUP/SIP-i Rx Vo LTE LTEUu S1- S11 S6a S9 Gx S6a Sh Cx SGi Management ENUM CS Network SIGNALING SOLUTIONS SIP/IMS User Equipment enodeb SEG S1-U SGW S5 PGW SDC Gx Signaling Delivery Controller HSS BIG-IP Platform Aggregation of SIP messages Message-based load balancing TLS offload for SIP sessions Call flow blocking prevention BIG-IP Platform Load balancing of ENUM traffic F5 delivers SIP solutions as part of a highly available, scalable, and secure IMS network infrastructure. With LTE, service providers are delivering higher broadband speeds, rich multimedia communication services, and VoLTE to achieve service differentiation and increased ARPU. To accomplish this, service providers have implemented IMS architectures, with SIP being one of the primary signaling protocols required to enable innovative applications and services. However, migrating to an all IP-based network has its challenges, including security concerns. Specifically, the open-standard nature of the protocols make IP networks and services prone to attacks that include DoS, DDoS, stealth floods, and botnets, as well as malformed or unroutable SIP requests. In addition, migration to all IP-based networks can pose challenges in managing capacity and performance as subscriber usage continues to increase over time, and, most importantly, in ensuring that all IP-based services are always available. Ensure interoperability of SIP requests and responses throughout IP infrastructure Scale to handle millions of subscriber calls simultaneously Enhance reliability at carrier-grade levels, including session synchronization and full failover capabilities with no connection loss The F5 BIG-IP platform delivers SIP solutions as part of a highly available, scalable, and secure system for the IMS network infrastructure, including devices such as X-CSCF servers and session border controllers (SBC). BIG-IP devices or virtual editions are positioned in front of SIP infrastructure and application servers. Here, they manage SIP traffic and ensure service availability by continuously monitoring the SIP servers and applications at layer 7 and by managing sessions between the different servers. Based on the health and load of the servers, each new SIP session is forwarded to the most appropriate server. In addition, the BIG-IP platform can perform advanced health checks on SIP devices and route SIP clients away from unstable servers, providing increased reliability to existing SIP solutions. BIG-IP instances provide SIP normalization, ensuring there are no interoperability issues between IMS services by transforming the SIP requests and responses as necessary between multiple devices within the IMS architecture. The BIG-IP platform also enhances security by detecting and automatically dropping SIP communications that are malformed or contain errors. In addition, BIG-IP instances can log and report any unusual increase in SIP requests, including content that is malformed, contains errors, or otherwise appears to rapidly increase the threat of attacks
23 PROJECT: GUIDE-SP-CCNF USE CASE DIAGRAM: Virtual CPE NFV Management and Orchestration Virtual Infrastructure Manager VNF Manager Orchestrator VNF Manager vadc vfw vpcef vswg vasm vdns vcgn vdra VNF Customer Portal F5 Virtual Network Functions L4 L7 Services NETWORK FUNCTIONS VIRTUALIZATION Virtual CPE Enterprise Users L2 L3 Services DNSaaS FWaaS LBaaS Data and signaling Virtualize CPE to deliver service offerings with greater speed, automation, and self-service convenience. Virtual CPE Services Signaling and management Launching and deploying new services to enterprise customers can significantly challenge service providers. Service providers with rigid, inflexible network infrastructures incur higher CapEx and OpEx costs to physically install and provision services and customer premises equipment (CPE) in each customer location. In addition, when customers want to change a service or add capacity, the service provider needs to go on-site again to reconfigure, update, or swap out the device. From the enterprise perspective, any change requires them to schedule time and wait for the service to be turned on, causing significant delays and loss to their business, which in turn can lead to lost revenues for the service provider, as well as lower customer satisfaction. Virtual CPE helps service providers take advantage of common network functions virtualization (NFV) infrastructure for services deployed in the cloud and in the network. With NFV, where multiple core network functionalities are offered, virtual CPE enables service providers to adopt a cloud model. This cloud model enables you to share a common pool of resources and dynamically allocate physical compute and network resources to virtual network functions (VNF). You can deploy individual instances of virtualized network functions and offer them as services on customer premises. Quickly introduce and deploy new network services Reduce CapEx and OpEx for delivery of services on customer premises Achieve end-to-end service automation and orchestration Dynamically spin up and spin down services Improve customer satisfaction and retention Enterprise customers can spin up or spin down instances of network functions or order new services that can be dynamically provisioned in a single location or multiple global locations. Services can be ordered and provisioned via a self-service web portal offered by the service provider. This self-service enables service providers and enterprises alike to move from the complexities, costs, and long delivery cycles associated with deploying physical devices to a cloud-centric, automated, and agile model of service delivery as and wherever needed. All F5 VNFs can be deployed as a service, including load balancing as a service (LBaaS), firewall as a service (FWaaS), and DNS as a service (DNSaaS). By taking advantage of virtual CPE, you ll achieve faster deployments in the network, faster recognition, higher revenues from service monetization, and a higher return on investment (ROI)
24 PROJECT: GUIDE-SP-CCNF USE CASE DIAGRAM: Virtual Gi-LAN Policy-Based, Dynamic Service Chaining F5 Virtual Network Functions vadc vfw vdns vpcef VNF VNF VNF VNF Enterprise Users PGW/ GGSN NETWORK FUNCTIONS VIRTUALIZATION Virtual Gi LAN Video Optimization Transparent Caching URL Filtering Virtual VAS Platforms Parental Controls Simplify the network and speed time to market with a virtual Gi LAN. The increases in mobile traffic, applications, and video streaming are placing a significant strain on the mobile network, including the Gi LAN. Within the Gi LAN are services including network address translation (NAT), firewall, policy management, traffic steering, and URL filtering, as well as TCP and video optimization. Service providers are able to intelligently steer traffic, including video traffic, to optimization platforms or apply intelligent policy management actions based on subscriber and application awareness. As mobile traffic increases, service providers need to scale out the Gi LAN, which in many cases consists of solutions from multiple vendors. For that reason, adding new services to the network can result in increased CapEx and OpEx while introducing additional complexities and increased points of failure into the network. As a result, delivery of new services to subscribers becomes more complex, with major delays, leading to loss of new revenue streams and lowered subscriber QoE. A virtualized Gi LAN solution from F5 enables you to build a cost-effective model, allowing for faster time to market for new services while reducing network complexity. F5 VNFs are a core component within an efficient virtual Gi LAN, providing solutions such as virtual policy enforcement, virtual firewall, and virtual Application Delivery Controller (ADC) services. These virtual solutions enable you to provide intelligent traffic steering to VAS components. You can dynamically chain together services based on real-time subscriber and application awareness, as well as secure the Gi LAN. By deploying a common, shared set of commercial, off-the-shelf (COTS) hardware to run various functions network functions as well as software you can reduce hardware costs as well as deploy multiple services dynamically. This cloud-like model means you can deliver service functions based on real-time network conditions and improve network resource utilization. You also achieve greater service agility, as you can launch new services without any network downtime. A virtual Gi LAN allows you to innovate, improve subscriber QoE, and lower costs. Reduce CapEx and OpEx with COTS hardware Increase service agility with faster build, test, and deploy cycles Dynamically manage and orchestrate services Tailor innovative services to subscriber preference and usage Simplify the network architecture with software-based network functions 46 47
25 PROJECT: GUIDE-SP-CCNF USE CASE DIAGRAM: Virtual EPC vepc PGW vdns VNF Enterprise Users enodeb F5 Virtual Network Functions NETWORK FUNCTIONS VIRTUALIZATION Virtual EPC SGW A virtual EPC reduces TCO and enables fast spin up and spin down of new services. Given increases in mobile data usage, and more notably, exponential growth in video traffic and growth in VoLTE, service providers need to architect their evolved packet cores (EPCs) to not only support the growth in traffic but also to ensure that they can deliver a superior QoS at all times. As the market evolves, so must the EPC, including the ability to dynamically scale up to meet traffic demands during peak congestion hours and the flexibility to instantiate new services based on real-time network conditions. At the same time, service providers must ensure service availability and meet real-time performance requirements. Reduce network costs Improve network architecture flexibility Speed service velocity Increase automation Virtualizing the EPC allows service providers to quickly realize significant TCO savings and speed time to market for new services. In addition, service providers can reduce OpEx by dynamically spinning up and spinning down various network resources based on network demand and capacity. F5 solutions using BIG-IP virtual editions include virtualized GTP load balancers, policy management, and Diameter signaling solutions. F5 virtual ADCs based on BIG-IP Local Traffic Manager (LTM) Virtual Edition help you perform GTP load balancing among a group of PGWs/SGWs. And by taking advantage of the global server load balancing (GSLB) and dynamic gateway selection functionality of BIG-IP DNS, you can monitor virtual packet gateways and only provide answers to the DNS queries for gateways that are active and available. If a packet gateway goes down, BIG-IP DNS will distribute the traffic load intelligently across only the available packet gateways, ensuring the best subscriber experience. F5 s NFV solutions rely on open REST-based APIs that are interoperable with leading management and orchestration systems, providing a complete NFV ecosystem. These solutions deliver a flexible, agile, and scalable network that helps you deliver services to market faster, improve network efficiency, and reduce CapEx and OpEx
26 PROJECT: GUIDE-SP-CCNF USE CASE DIAGRAM: Virtual IMS PLMN IPX Network Policy and Subscriber Management IMS Control vpcrf HSS vocs vpcrf vaaa/hss vx-cscf vsbc vmmtel/vas vepc Diameter Svcs Control Plane Data Plane vfw vdea vadc vdra PGW vdns VNF NETWORK FUNCTIONS VIRTUALIZATION Virtual IMS Network Enterprise Users enodeb SGW F5 Virtual Network Functions Data and signaling Signaling and management The vdea and vdra of the F5 SDC enable efficient routing, security, and policy Service providers who have deployed LTE networks want to capitalize and monetize the investment, and offering new services such as VoLTE can help open new market opportunities and increase revenue streams. As subscriber growth and demands for network capacity increase, however, service providers also need to build out their networks to rapidly create, launch, and scale new services. A core component of deploying VoLTE services in an LTE network is the IMS network, where SIP and Diameter signaling elements must be scaled out. Migrating your network to NFV and virtualizing the IMS network will reduce network complexity and costs while providing a scalable solution that enables you to spin up and spin down services based on customer and network requirements. F5 virtual signaling solutions, including the Traffix SDC, which incorporates the virtual Diameter Routing Agent (vdra) and virtual Diameter Edge Agent (vdea), can be deployed to address scaling in network signaling and control planes. With SDC, service providers can ensure delivery of a high QoE for services such as VoLTE running over an IMS network. The vdra provides a context-aware routing engine that manages Diameter signaling to ensure high performance and reliability in the control plane. The vdra also supports LTE network roaming, policy and charging rules, and enforcement, and it interconnects between legacy and LTE network use cases. Quickly introduce and deploy new network services Reduce CapEx and OpEx for delivery of services on customer premises Achieve end-to-end service automation and orchestration Dynamically spin up and spin down services Improve customer satisfaction and retention The vdea provides tighter security and normalized functionality in LTE roaming, allowing for IPX carriers to provide security for traffic from other mobile network operators (MNOs) and mobile virtual network operators (MVNOs). The vdea can also be located at the edge of the network to protect against unexpected signaling surges that can cause service disruption. F5 s virtual ADC (vadc) provides scalability for SIP services within an IMS architecture. The vadc manages SIP traffic and ensures service availability by continuously monitoring SIP servers and applications and managing sessions between the different servers. The vadc also provides SIP security and protects IMS networks from DoS and DDoS attacks, stealth floods, and botnets, as well as malformed or unroutable SIP requests
27 CONCLUSION F5 Solutions for Service Providers F5 solutions for service providers enable mobile network F5 solutions for service providers include a high- F5 enables fixed and mobile service providers to leverage SIP. The F5 DNS solution, BIG-IP DNS, allows service operators to optimize, secure, and monetize their performance services fabric composed of any next-generation networks that provide a superior providers to optimize their LDNS, authoritative DNS, and networks. The solutions use a common, shared platform combination of hardware or virtual network functions customer experience. Intelligent L4 L7 network devices infrastructure DNS delivering a high subscriber QoE to reduce operational overhead and improve service- (VNFs). F5 VIPRION offerings support up to 1.2 billion play a primary role in the F5 approach to solution design, that results in increased revenues and reduced churn. provisioning velocity while addressing key security concurrent connections and greater than one terabit allowing service providers to maintain high network concerns across the network. F5 solutions for service providers enable mobile network operators to scale in three dimensions the control, data, and application planes supporting the highest connection rates and concurrency levels in the industry. Control Plane The control plane is the heart of a service provider network. Tasked with the responsibility for managing subscriber use and ensuring the appropriate services are applied to traffic, it can easily become overwhelmed by signaling storms that occur due to spikes in activations or, for example, an -wide gaming addiction that causes millions of concurrent players to join in. (1 TB) of throughput, while F5 VNFs and BIG-IP virtual editions (VEs) support L4 throughput up to 70 Gbps. The F5 high-performance services fabric is built on a common, shared, and optimized platform on which key service provider functions can be consolidated. By consolidating services in the Gi network on a single platform, providers can eliminate the operational overhead incurred by the need to manage multiple point products, including CGNAT and firewalls. Application Plane Value-added services are a key differentiator and key revenue opportunity for service providers, but can also be the source of poor performance due to the requirement to route all data traffic through all services, regardless of their applicability. Sending text through performance while expanding customized products and services for specific audiences. Diameter Signaling Management Diameter signaling messages serve as an excellent source of information on network operations and subscribers. When extrapolated, this information may be used to differentiate service offerings and improve the customer experience. As the market s most mature Diameter solution, the SDC consolidates a Diameter Routing Agent (DRA), a Diameter Edge Agent (DEA), a Diameter load balancer, and a Diameter gateway and translation (including IWF) on a single platform. Thus operators can benefit from contextaware intelligent routing; reliable load balancing; and flexible, seamless connectivity. Carrier-Grade Network Firewall Security F5 provides integrated, high-performance ICSA Labs Certified security solutions. F5 carrier-class network firewall solutions protect the entire network infrastructure and scale to perform under the most demanding conditions. Operators benefit from the solutions' intelligence, flexibility for enhancement, and simplification of network security in the increasingly threatening landscape with a common platform to deliver applications and improve responsiveness. BIG-IP Application Security Manager (ASM) enhances security for applications by providing comprehensive web security and L7 DDoS protection. The control plane is driven predominantly by Diameter and SIP signaling protocols. F5 traffic management and signaling solutions include BIG-IP PEM and the Traffix SDC, which help mobile network operators scale the control plane while enabling the creation of new controlplane services. This enables service providers to deliver secure, SLA-based services to users. Data Plane The service provider data plane serves as the backbone between the mobile network and the, and it must be able to support millions of consumer requests for applications. Bandwidth-hungry applications like a video optimization service or video through an ad insertion service does not add value, but it does consume resources and time impacting the overall subscriber experience. F5 solutions for service providers work with virtual machine provisioning systems to help service providers move toward network functions virtualization (NFV) based architectures. Intelligent monitoring of valueadded services, combined with awareness of load and demand, enable service providers to ensure that VAS platforms can be scaled up and down individually, resulting in significant cost savings across the VAS infrastructure. Intelligent Traffic Management and Policy Enforcement F5 offers intelligent traffic management solutions on a unified platform that simplifies delivery of network services such as dynamic service chaining. Using context- and subscriber-aware technology, BIG-IP PEM offers a full-proxy architecture and rich IP capabilities for critical traffic visibility and analytics, as well as sophisticated traffic-steering capabilities including the ability to inspect and route traffic based on data type and subscribers profiles. SDN and NFV Solutions With F5 solutions, service providers can move to software-defined networking (SDN) and NFV architectures for greater agility. They can deploy applications and services across multiple hybrid network architectures and evolving NFV environments using both F5 s purpose-built, carrier-grade chassis and VNFs. The fully virtualized, carrier-grade F5 network architecture reduces operator dependency on inflexible hardware and enables a more dynamic, flexible, and agile network. Operators can rapidly test and deliver a variety of personalized services while managing rapid growth and increasing efficiency and security. video can become problematic for the data plane and cause degradations in performance that hamper the subscriber experience and send subscribers off looking for a new provider. With F5 solutions, mobile network operators can simplify their Gi networks and combine physical, virtual, and cloud-based deployments to form a unified, elastic, high-performance services fabric. This enables more efficient network architectures while laying the foundation for rapid service creation and deployment. DNS Services to Manage Network Growth F5's comprehensive control and data plane solutions optimize, intelligently scale, and securely manage messaging interfaces such as RADIUS, DNS, and F5 solutions also help generate new revenues through services such as parental controls, enhanced security, shared data plans, application-based charging, VoLTE, URL filtering, and content insertion. All can help operators take advantage of new opportunities to grow new revenue streams
28 About F5 F5 (NASDAQ: FFIV) provides solutions for an application world. F5 helps organizations seamlessly scale cloud, data center, and SDN deployments to successfully deliver applications to anyone, anywhere, at any time. F5 solutions broaden the reach of IT through an open, extensible framework and a rich partner ecosystem of leading technology and data center orchestration vendors. This approach lets customers pursue the infrastructure model that best fits their needs over time. The world s largest businesses, service providers, government entities, and consumer brands rely on F5 to stay ahead of cloud, security, and mobility trends. For more information, go to f5.com. F5 Networks, Inc. f5.com US Headquarters: 401 Elliott Ave W, Seattle, WA // Americas: [email protected] // Asia-Pacific: [email protected] // Europe/Middle East/Africa: [email protected] // Japan: [email protected] 2016 F5 Networks, Inc. All rights reserved. F5, F5 Networks, and the F5 logo are trademarks of F5 Networks, Inc. in the U.S. and in certain other countries. Other F5 trademarks are identified at f5.com. Any other products, services, or company names referenced herein may be trademarks of their respective owners with no endorsement or affiliation, express or implied, claimed by F5. DC0215 GUIDE-SP-CCNF
OVERVIEW. Virtual Solutions for Your NFV Environment
Contents Introduction 3 Build a Virtualized Network with F5 s 4 Virtual Firewall (vfw) 4 Virtual CGNAT (vcgn) 4 Virtual Policy Charging Enforcement Function (vpcef) 4 Virtual Content Insertion (vci) 4
F5 Intelligent DNS Scale. Philippe Bogaerts Senior Field Systems Engineer mailto: [email protected] Mob.: +32 473 654 689
F5 Intelligent Scale Philippe Bogaerts Senior Field Systems Engineer mailto: [email protected] Mob.: +32 473 654 689 Intelligent and scalable PROTECTS web properties and brand reputation IMPROVES web application
Wanderlust: Enabling roaming in the LTE era. Don Troshynski Vice President, Solutions Architecture
Wanderlust: Enabling roaming in the LTE era Don Troshynski Vice President, Solutions Architecture Acme Packet Trusted, first-class services and applications Apps & services Session delivery network April
Diameter in the Evolved Packet Core
Diameter in the Evolved Packet Core A Whitepaper November 2009 Page 2 DIAMETER in the Evolved Packet Core Mobile broadband is becoming a reality, as the Internet generation grows accustomed to having broadband
Signaling Delivery Controller : Control Your 4G Network
Data Sheet Traffix Systems Signaling Delivery Controller : Control Your 4G Network The Traffix Signaling Delivery Controller (SDC) assists operators in scaling and managing services and applications in
Management & Orchestration of Metaswitch s Perimeta Virtual SBC
Metaswitch.com OvertureNetworks.com Management & Orchestration of Metaswitch s Perimeta Virtual SBC Fortify your edge and protect your core with the Perimeta Session Border Controller: Virtual The 1st
Service Automation Made Easy
Service Automation Made Easy Networks that know how to customize the network experience for every subscriber Challenge Service providers want to quickly develop and deliver personalized services their
Security MWC 2014. 2013 Nokia Solutions and Networks. All rights reserved.
Security MWC 2014 2013 Nokia Solutions and Networks. All rights reserved. Security Ecosystem overview Partners Network security demo + End-user security demo + + + + NSN end-to-end security solutions for
Session Border Controllers: Addressing Tomorrow s Requirements
White Paper Session Border Controllers: Addressing Tomorrow s Requirements Prepared by Jim Hodges Senior Analyst, Heavy Reading www.heavyreading.com on behalf of www.metaswitch.com September 2011 Introduction
Building Robust Signaling Networks
ericsson White paper Uen 284 23-3268 July 2015 Building Robust Signaling Networks MEETING THE CHALLENGES OF THE RISING SIGNALING STORM Distributed signaling network robustness that follows the concept
Dialogic BorderNet Session Border Controller Solutions
Dialogic BorderNet Session Border Controller Solutions Dialogic BorderNet Session Border Controllers Transform, Connect and Secure Today s Networks and Services Dialogic BorderNet Session Border Controller
Voice over IP over LTE (VoLTE) Impacts on LTE access. EFORT http://www.efort.com
1 Introduction Voice over IP over LTE (VoLTE) Impacts on LTE access EFORT http://www.efort.com IMS (IP Multimedia Subsystems) has been around for some time, and many infrastructure vendors have invested
The F5 Intelligent DNS Scale Reference Architecture.
The F5 Intelligent DNS Scale Reference Architecture. End-to-end DNS delivery solutions from F5 maximize the use of organizational resources, while remaining agile and intelligent enough to scale and support
Dynamic Service Chaining for NFV/SDN
Dynamic Service Chaining for NFV/SDN Kishore Inampudi A10 Networks, Inc. Agenda Introduction NFV Reference Architecture NFV Use cases Policy Enforcement in NFV/SDN Challenges in NFV environments Policy
Efficient evolution to all-ip
Press information June 2006 Efficient evolution to all-ip The competitive landscape for operators and service providers is constantly changing. New technologies and network capabilities enable new players
Optimize DNS, Secure and Ensure Availability, and Monetize Usage
Service Provider BIG-IP Global Traffic Manager DATASHEET Optimize DNS, Secure and Ensure Availability, and Monetize Usage What s Inside 2 Increasing Services Demand 2 F5 DNS Services in Service Provider
SDN and NFV in the WAN
WHITE PAPER Hybrid Networking SDN and NFV in the WAN HOW THESE POWERFUL TECHNOLOGIES ARE DRIVING ENTERPRISE INNOVATION rev. 110615 Table of Contents Introduction 3 Software Defined Networking 3 Network
S-Series SBC Interconnect Solutions. A GENBAND Application Note May 2009
S-Series SBC Interconnect Solutions A GENBAND Application Note May 2009 Business Requirements A ubiquitous global voice service offering is the challenge among today s large service providers. The need
Cisco Satellite Services Platform Delivering Managed Services over Satellite
Solution Overview Cisco Satellite Services Platform Delivering Managed Services over Satellite With the increase in available bandwidth from the launch of high-throughput satellites, satellite service
Business Case for a DDoS Consolidated Solution
Business Case for a DDoS Consolidated Solution Executive Summary Distributed denial-of-service (DDoS) attacks are becoming more serious and sophisticated. Attack motivations are increasingly financial
Acme Packet Net-Net SIP Multimedia-Xpress
Acme Packet Net-Net SIP Overview Net-Net SIP (SMX) combines IP Multimedia Subsystem (IMS) session management with leading session border control (SBC) functions to reduce the complexity and cost of delivering
Intelligent Policy Enforcement for LTE Networks
The New Digital Lifestyle and LTE Intelligent Policy Enforcement for LTE Networks Mobile data networks are an essential tool in our hyperconnected society for streaming video, social networking, and collaboration.
MINIMUM NETWORK REQUIREMENTS 1. REQUIREMENTS SUMMARY... 1
Table of Contents 1. REQUIREMENTS SUMMARY... 1 2. REQUIREMENTS DETAIL... 2 2.1 DHCP SERVER... 2 2.2 DNS SERVER... 2 2.3 FIREWALLS... 3 2.4 NETWORK ADDRESS TRANSLATION... 4 2.5 APPLICATION LAYER GATEWAY...
Session Border Controllers in Enterprise
A Light Reading Webinar Session Border Controllers in Enterprise Thursday, October 7, 2010 Hosted by Jim Hodges Senior Analyst Heavy Reading Sponsored by: Speakers Natasha Tamaskar VP Product Marketing
Implementing LTE International Data Roaming
Implementing International Data Roaming Data Roaming Standardization Implementing International Data Roaming On completion of EPC standardization at 3GPP, specifications for international roaming between
Business Case for Data Center Network Consolidation
Business Case for Data Center Network Consolidation Executive Summary Innovations in cloud, big data, and mobility as well as users expectations for anywhere, anytime, and any device access are defining
Network Function Virtualization Primer. Understanding NFV, Its Benefits, and Its Applications
Network Function Virtualization Primer Understanding NFV, Its Benefits, and Its Applications Table of Contents Introduction..................................... 3 NFV The Basics...................................
Whitepaper. 10 Metrics to Monitor in the LTE Network. www.sevone.com blog.sevone.com [email protected]
10 Metrics to Monitor in the LTE Network The deployment of LTE increases dependency on the underlying network, which must be closely monitored in order to avert serviceimpacting events. In addition, the
WAN Traffic Management with PowerLink Pro100
Whitepaper WAN Traffic Management with PowerLink Pro100 Overview In today s Internet marketplace, optimizing online presence is crucial for business success. Wan/ISP link failover and traffic management
Infrastructure for more security and flexibility to deliver the Next-Generation Data Center
Infrastructure for more security and flexibility to deliver the Next-Generation Data Center Stefan Volmari Manager Systems Engineering Networking & Cloud Today's trends turn into major challenges Cloud
10 METRICS TO MONITOR IN THE LTE NETWORK. [ WhitePaper ]
[ WhitePaper ] 10 10 METRICS TO MONITOR IN THE LTE NETWORK. Abstract: The deployment of LTE increases dependency on the underlying network, which must be closely monitored in order to avert service-impacting
ALCATEL-LUCENT 7750 SERVICE ROUTER NEXT-GENERATION MOBILE GATEWAY FOR LTE/4G AND 2G/3G AND ANCHOR FOR CELLULAR-WI-FI CONVERGENCE
ALCATEL-LUCENT 7750 SERVICE ROUTER NEXT-GENERATION MOBILE GATEWAY FOR LTE/4G AND 2G/3G AND ANCHOR FOR CELLULAR-WI-FI CONVERGENCE The is a next generation mobile packet core data plane platform that supports
The Evolution to Local Content Delivery
The Evolution to Local Content Delivery Content caching brings many benefits as operators work out how to cope with the astounding growth in demand for Internet video and other OTT content driven by Broadband
464XLAT in mobile networks
STRATEGIC WHITE PAPER IPv6 migration strategies for mobile networks To cope with the increasing demand for IP addresses, most mobile network operators (MNOs) have deployed Carrier Grade Network Address
Delivering Managed Services Using Next Generation Branch Architectures
Delivering Managed Services Using Next Generation Branch Architectures By: Lee Doyle, Principal Analyst at Doyle Research Sponsored by Versa Networks Executive Summary Network architectures for the WAN
The Benefits of SD-WAN with Integrated Branch Security
The Benefits of with Integrated Branch Security Branch Networking Today More Bandwidth, More Complexity Branch or remote office network architectures have barely changed for 15+ years. But the requirements
Dialogic. BorderNet Products Interwork and Connect Seamlessly and Securely at the Network Edge
Dialogic BorderNet Products Interwork and Connect Seamlessly and Securely at the Network Edge Versatile Dialogic BorderNet Products Handle Network Transitions for Today s Critical Services and Solutions
Business Intelligence and Policies to Drive Profitable Mobile Broadband Services
Business Intelligence and Policies to Drive Profitable Mobile Broadband Services Niloufar Tayebi Product Marketing Director, GENBAND Femtocells World Summit, June 2011, London, UK Outline Business Intelligence
THUNDER ADC MEETS MOBILE SERVICE PROVIDER NETWORK CHALLENGES Safeguard and Optimize Service Availability with A10 Networks
SOLUTION BRIEF THUNDER ADC MEETS MOBILE SERVICE PROVIDER NETWORK CHALLENGES Safeguard and Optimize Service Availability with A10 Networks Challenge: Mobile service providers need to rapidly deploy innovative
Virtual CPE and Software Defined Networking
Virtual CPE and Software Defined Networking Virtual CPE and Software Defined Networking Residential broadband service providers are looking for solutions that allow them to rapidly introduce innovative
The Next Generation Network:
JULY, 2012 The Next Generation Network: Why the Distributed Enterprise Should Consider Multi-circuit WAN VPN Solutions versus Traditional MPLS Tolt Solutions Network Services 125 Technology Drive Suite
Testing Challenges for Modern Networks Built Using SDN and OpenFlow
Using SDN and OpenFlow July 2013 Rev. A 07/13 SPIRENT 1325 Borregas Avenue Sunnyvale, CA 94089 USA Email: Web: [email protected] www.spirent.com AMERICAS 1-800-SPIRENT +1-818-676-2683 [email protected]
The Distributed Cloud: Automating, Scaling, Securing & Orchestrating the Edge
White Paper The Distributed Cloud: Automating, Scaling, Securing & Orchestrating the Edge Prepared by Jim Hodges Senior Analyst, Heavy Reading www.heavyreading.com on behalf of www.juniper.net October
Intelligent Policy Enforcement Solutions for Mobile Service Providers
Intelligent Policy Enforcement Solutions for Mobile Service Providers To do more with your wireless network you need to see more. Imagine being able to view network activity down to the granular level,
Security F5 SECURITY SOLUTION GUIDE
F5 SECURITY SOLUTION GUIDE Security Protect your data center and application services, improve user access, optimize performance, and reduce management complexity. 1 WHAT'S INSIDE Data Center Firewall
Cisco ACI and F5 LTM Integration for accelerated application deployments. Dennis de Leest Sr. Systems Engineer F5
Cisco ACI and F5 LTM Integration for accelerated application deployments Dennis de Leest Sr. Systems Engineer F5 Agenda F5 Networks Who are we and what is Big-IP? F5 Synthesis Software Defined Application
How To Make A Cloud Bursting System Work For A Business
Where will your application be in the future, in the cloud, on premises, off premises? How will you protect them? Nigel Ashworth Solution Architect EMEA Advanced threats Software defined everything SDDC/Cloud
Supporting Municipal Business Models with Cisco Outdoor Wireless Solutions
Supporting Municipal Business Models with Cisco Outdoor Wireless Solutions EXECUTIVE SUMMARY Outdoor wireless networks are playing a vital role in helping municipalities deliver critical services to citizens.
Amdocs Policy Controller
Amdocs Policy Controller The Amdocs Policy Controller is a highly flexible and scalable policy server specifically designed to help service providers manage the impact of mobile data growth on their networks
The BorderNet Session Border Controller and Network Function Virtualization
The BorderNet Session Border Controller and Network Service providers today are making a fundamental shift away from their traditional ways of doing business and delivering services as they face alternative
Application centric Datacenter Management. Ralf Brünig, F5 Networks GmbH Field Systems Engineer March 2014
Application centric Datacenter Management Ralf Brünig, F5 Networks GmbH Field Systems Engineer March 2014 Index Application Deliver Controller (ADC) Proxy ADC Advanced Feature Application Management Optional:
NFV Management and Orchestration: Enabling Rapid Service Innovation in the Era of Virtualization
White Paper NFV Management and Orchestration: Enabling Rapid Service Innovation in the Era of Virtualization NFV Orchestration Overview Network Function Virtualization (NFV) technology, in combination
DOES YOUR PCRF HAVE WHAT IT TAKES TO SUPPORT VOLTE?
DOES YOUR PCRF HAVE WHAT IT TAKES TO SUPPORT VOLTE? DOES YOUR PCRF HAVE WHAT IT TAKES TO SUPPORT VOLTE? 2 Table of Contents EXECUTIVE SUMMARY...3 INTRODUCTION...3 WHAT S SPECIAL ABOUT VOLTE TRAFFIC?...4
VoLTE and the Service Delivery Engine
A Sandvine Technology Showcase Contents Executive Summary... 1 Introduction to VoLTE... 2 Sandvine s Service Delivery Engine... 3 VoLTE Features... 3 Deployment Architecture... 4 Scalability... 4 Reducing
Real World IPv6 Migration Solutions. Asoka De Saram Sr. Director of Systems Engineering, A10 Networks
Real World IPv6 Migration Solutions Asoka De Saram Sr. Director of Systems Engineering, A10 Networks 1 Agenda Choosing the right solutions Design considerations IPv4 to IPv6 migration road map Consumer
WHITE PAPER. Centrally Monitoring Set-tops and Implementing Whole-Home Video Assurance
WHITE PAPER Centrally Monitoring Set-tops and Implementing Whole-Home Video Assurance Contents Introduction...3 The Need for Home Network Visibility for Managing Video Services...3 Video Service Assurance:
SDN PARTNER INTEGRATION: SANDVINE
SDN PARTNER INTEGRATION: SANDVINE SDN PARTNERSHIPS SSD STRATEGY & MARKETING SERVICE PROVIDER CHALLENGES TIME TO SERVICE PRODUCT EVOLUTION OVER THE TOP THREAT NETWORK TO CLOUD B/OSS AGILITY Lengthy service
Intelligent Policy Enforcement Solutions for Broadband Service Providers
Intelligent Policy Enforcement Solutions for Broadband Service Providers To do more with your broadband network you need to see more. Imagine being able to view network activity down to the granular level,
Customer Benefits Through Automation with SDN and NFV
Customer Benefits Through Automation with SDN and NFV Helping service providers solve specific challenges they are facing today while improving the overall customer service life cycle 1 Table of Contents
5 Key Reasons to Migrate from Cisco ACE to F5 BIG-IP
5 Key Reasons to Migrate from Cisco ACE to F5 BIG-IP With support for Cisco ACE load balancer ending, organizations need to find an alternative. Contents Introduction 3 Advanced Architecture 3 Ease of
Transforming Service Life Cycle Through Automation with SDN and NFV
Transforming Service Life Cycle Through Automation with SDN and NFV Automated workflows improve TCO for service delivery 1 Table of Contents Executive Summary... 3 Introduction... 3 Today s Challenges...
THE VIRTUAL PROBE: ASSURANCE & MONITORING IN THE NFV/SDN ERA
THE VIRTUAL PROBE: ASSURANCE & MONITORING IN THE NFV/SDN ERA White paper December 2015 2 Amdocs service assurance and customer experience monitoring solution is designed for operators who are migrating
Telecommunication Services Engineering (TSE) Lab. Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC)
Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC) http://users.encs.concordia.ca/~glitho/ Outline 1. LTE 2. EPC architectures (Basic and advanced) 3. Mobility management in EPC 4.
Integrating Lawful Intercept into the Next Generation 4G LTE Network
Integrating Lawful Intercept into the Next Generation 4G LTE Network All telecommunication providers that currently or plan to provide 4G LTE service to their customers must consider significant changes
Nokia Siemens Networks Flexi Network Gateway. Brochure
Nokia Siemens Networks Flexi Network Gateway Prepare for Mobile Broadband Growth Brochure. 2/14 Brochure Table of Content 1. Towards the flat all-ip Network... 3 2. Preparing the Gateway for Mobile Broadband
Top 10 Reasons Enterprises are Moving Security to the Cloud
ZSCALER EBOOK Top 10 Reasons Enterprises are Moving Security to the Cloud A better approach to security Albert Einstein defined insanity as doing the same thing over and over again and expecting different
Diameter Interworking. Interworking Eases Network Transition, Ensures Widest Range of Roaming and Increases Roaming Revenues
Diameter Interworking Interworking Eases Network Transition, Ensures Widest Range of Roaming and Increases Roaming Revenues Table of Contents Introduction..................................... 3 Business
Business Case for BTI Intelligent Cloud Connect for Content, Co-lo and Network Providers
Business Case for BTI Intelligent Cloud Connect for Content, Co-lo and Network Providers s Executive Summary Cloud computing, video streaming, and social media are contributing to a dramatic rise in metro
Juniper Networks Universal Edge: Scaling for the New Network
Juniper Networks Universal Edge: Scaling for the New Network Executive Summary End-user demand for anywhere and anytime access to rich media content is dramatically increasing pressure on service provider
Cisco Integrated Services Routers Performance Overview
Integrated Services Routers Performance Overview What You Will Learn The Integrated Services Routers Generation 2 (ISR G2) provide a robust platform for delivering WAN services, unified communications,
NFV & SDN World. Practical Approaches to NFV Orchestration Deployment. Terry McCabe CTO Mobile Business Unit
NFV & SDN World Practical Approaches to NFV Orchestration Deployment Terry McCabe CTO Mobile Business Unit May 2015 Mitel 2 2015 Mitel. Proprietary and Confidential. Mavenir 4G Customer Launches Mavenir
Cisco IWAN and Akamai Intelligent Platform : Maximize Your WAN Investment
Cisco IWAN and Akamai Intelligent Platform : Maximize Your WAN Investment What You Will Learn Cisco Systems and Akamai Technologies intend to deliver the world s first combined Cisco Intelligent WAN with
Access Mediation: Preserving Network Security and Integrity
Access Mediation: Preserving Network Security and Integrity Definition Access mediation is the process of examining and controlling signaling traffic between networks, resources and users by filtering
Threat-Centric Security for Service Providers
Threat-Centric Security for Service Providers Enabling Open & Programmable Networks Sam Rastogi, Service Provider Security Product Marketing, Security Business Group Bill Mabon, Network Security Product
Business Use Cases enabled by Policy- Centric Networks
Business Use Cases enabled by Policy- Centric Networks An AdvOSS Solution Whitepaper Author: Farhan Zaidi Contact: [email protected] Latest version of this white paper can always be found at http://advoss.com/resources/whitepapers/business-use-cases-enabled-by-policy-centricnetworks.pdf
Demo 1. Network Path and Quality Validation in the Evolved Packet Core
Competence Center NGNI Demo 1 Network Path and Quality Validation in the Evolved Packet Core 1 Fraunhofer Institute FOKUS and TU Berlin AV AV provides education and applied research together with Fraunhofer
Getting More Performance and Efficiency in the Application Delivery Network
SOLUTION BRIEF Intel Xeon Processor E5-2600 v2 Product Family Intel Solid-State Drives (Intel SSD) F5* Networks Delivery Controllers (ADCs) Networking and Communications Getting More Performance and Efficiency
Acme Packet Palladion Communications Operations Monitor
Overview As a proactive service monitoring solution, captures and analyzes all signaling messages and media from the network, providing full end-to-end correlation and quality metrics of all calls in real
ALEPO IN THE VIRTUALIZED CORE NETWORK
In this Document INTRODUCTION What is NFV? NFV Drivers & Benefits Alepo Virtualized Solutions The Alepo Advantage Network Function Virtualization has dominated the conversation in the communications industry
Nokia Siemens Networks Flexi Network Server
Nokia Siemens Networks Flexi Network Server Ushering network control into the LTE era 1. Moving towards LTE Rapidly increasing data volumes in mobile networks, pressure to reduce the cost per transmitted
Voice, Video and Data Convergence > A best-practice approach for transitioning your network infrastructure. White Paper
> A best-practice approach for transitioning your network infrastructure White Paper The business benefits of network convergence are clear: fast, dependable, real-time communication, unprecedented information
Zscaler Internet Security Frequently Asked Questions
Zscaler Internet Security Frequently Asked Questions 1 Technical FAQ PRODUCT LICENSING & PRICING How is Zscaler Internet Security Zscaler Internet Security is licensed on number of Cradlepoint devices
Control Plane Orchestration: The Evolution of Service Innovation Attributes
White Paper Control Plane Orchestration: The Evolution of Service Innovation Attributes Prepared by Jim Hodges Senior Analyst, Heavy Reading www.heavyreading.com on behalf of www.dialogic.com June 2014
Assuring Your Business Continuity
Assuring Your Business Continuity Q-Balancer Range Offering Business Continuity, Productivity, and Security Q-Balancer is designed to offer assured network connectivity to small and medium business (SME)
Ensuring end-user quality in NFV-based infrastructures
Ensuring end-user quality in NFV-based infrastructures Leveraging distributed NFV cloud nodes to provide instant assessment of end-user experience EXECUTIVE SUMMARY Compute resources for virtual network
Alcatel-Lucent Ultimate Wireless Broadband Solution. Re-define the wireless experience with the industry s most comprehensive end-to-end LTE solution
Alcatel-Lucent Ultimate Wireless Broadband Solution Re-define the wireless experience with the industry s most comprehensive end-to-end LTE solution The Ultimate Wireless Broadband End-to-End LTE solution
NETWORK ISSUES: COSTS & OPTIONS
VIDEO CONFERENCING NETWORK ISSUES: COSTS & OPTIONS Prepared By: S. Ann Earon, Ph.D., President Telemanagement Resources International Inc. Sponsored by Vidyo By:S.AnnEaron,Ph.D. Introduction Successful
INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS
WHITE PAPER INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS Network administrators and security teams can gain valuable insight into network health in real-time by
